Physical Layer Network Security in the Full-Duplex Relay System Gaojie Chen, Member, IEEE, Yu Gong, Member, IEEE, Pei Xiao, Senior Member, IEEE and Jonathon Chambers, Fellow, IEEE Abstract This paper investigates the secrecy performance of full duplex relay networks. The resulting analysis shows that full duplex relay networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, in which the relay node transmits jamming signals while receiving the data from the source. While the full duplex jamming scheme has the same data rate as the half duplex scheme, the secrecy performance can be significantly improved, making it an attractive scheme when the network secrecy is a primary concern. A mathematic model is developed to analyze secrecy outage probabilities for the half duplex, full duplex and full duplex jamming schemes, and simulation results are also presented to verify the analysis. Index Terms Physical layer secrecy, cooperative relay networks, full duplex relay, secrecy outage probability I. INTRODUCTION Unlike a traditional cryptographic system [], physical layer security is based on Shannon theory using channel coding rather than encryption) to achieve secure transmission [2] [7]. Due to the broadcast nature of wireless communications, both the intended receiver and eavesdropper may receive data from the source. But if the capacity of the intended data transmission channel is higher than that of the eavesdropping channel, the data can be transmitted at a rate close to the intended channel capacity so that only the intended receiver not the eavesdropper) can successfully decode the data. This is the principle of physical layer security, where the level of security is quantified by the secrecy capacity which is the capacity difference between the intended data transmission and eavesdropping channels. It is interesting to notice that both cooperative relay and physical layer security networks relay on wireless broadcasting. This implies that the popular cooperative networks, which have been well G. J. Chen, P. Xiao and J. A. Chambers are with the Institute for Communication Systems ICS), home of the 5G Innovation Centre, University of Surrey, Guildford, Surrey, UK, Emails: {gaojie.chen, p.xiao and j. a. chambers}@surrey.ac.uk. Y. Gong is with the Advanced Signal Processing Group, School of Electronic, Electrical and Systems Engineering, Loughborough University, Loughborough, Leicestershire, UK, Emails: y.gong@lboro.ac.uk.
2 investigated to improve transmission capacity, also provide an effective way to improve the secrecy capacity [8], [9]. A typical relay network with an eavesdropper is shown in Fig., where there is one source node S, one relay node R, one destination node D and one eavesdropper node E. Fig.. The secrecy relay network with an eavesdropper. The purpose of physical layer security in the cooperative network is to prevent the eavesdropper from decoding the data transmitted from S or R. This can be achieved by injecting jamming signals into the network with the assumption that the jamming power at the eavesdropper is higher than that at the intended destination e.g. [0]). The jamming signal must be used with care as it may also deteriorate the intended data transmission. This can be seen for example in [] where beamforming is used at the destination to reduce the negative effect of the jamming signals at the intended relay node. Current cooperative networks usually employ half duplex relays HDR-s) because of easy implementation. But this is at the price of 50% loss in spectral efficiency as two time slots are required to transmit one data packet. Full duplex transmission, which was previously considered impractical due to the associated self-interference, has attracted much attention recently due to the progress in self-interference cancelation techniques [2], [3]). For example, in [4], multiple antenna were used to suppress the selfinterference; in [5], [6], a joint analog and digital cancellation technique was proposed to mitigate the self-interference to the noise floor; in [7], two analog/rf designs were proposed which can avoid using bulky components and/or antenna structures in most existing self-interference approaches. Of particular interest is when the self-interference is significantly suppressed, the impact of full duplex transmission on physical layer security. In [8] and [9], the receiver operates in full duplex mode for better secrecy because it can simultaneously receive the data from the source and send a jamming signal to the eavesdropper.
3 Alternatively, in [20], it is the eavesdropper that is equipped with the full duplex technology, so that the eavesdropper can minimize the secrecy by receiving the data from the source and transmitting jamming signals to the intended receiver at the same time. These approaches consider the secrecy performance of a point-to-point full duplex system, and little work has been done for the full duplex relay network. In this paper, we investigate the secrecy performance of a full duplex relay network. In the full duplex network, the eavesdropper simultaneously receives signals from the source and relay which interfere with each other, making it harder for the eavesdropper to decode the data. This decreases the eavesdropping capacity, and then improves the secrecy performance. Moreover, because full duplex does not suffer from 50% loss in data rate, there is no /2 factor in both data transmission and eavesdropping capacities, which also leads to better secrecy performance. This will be investigated in detail later in this paper. In order to further increase the secrecy performance, we propose a full duplex jamming relay scheme, in which the relay simultaneously receives data from the source and sends jamming signals to the eavesdroppers. The proposed full duplex jamming scheme has good secrecy outage performance, though its data rate is the same as that for the half duplex scheme, making it an attractive scheme when the network secrecy is a primary concern. The contributions of the paper are listed as follows: We obtain a closed-form expression of the secrecy outage probability in a half duplex relay network, for the case that the eavesdropper can intercept the data from both the source and destination. To the best of our knowledge, this is the first time this has been done. In [9], the secrecy performance of a relay selection secrecy system is analyzed, but the resulting secrecy outage probability is actually a lower bound. This point will be further explained in Section II. We derive the maximum and approximate) minimum secrecy outage probability of a full duplex relay network, which well approximates the true secrecy outage probability. We also quantitatively compare the secrecy performance of the half duplex and full duplex relay networks. We propose a full duplex jamming network and analyze its secrecy outage probability. The remainder of the paper is organized as follows: Section II- IV analyze the secrecy performance for the half duplex, full duplex and full duplex jamming relay networks respectively; Section V gives numerical simulations to verify the analysis; finally, Section VI summarizes the paper. II. HALF DUPLEX SECRECY RELAY NETWORK In this section, we derive the secrecy outage probability of the half duplex secrecy network, which is used as a baseline to compare with a full duplex scheme and the newly proposed full duplex jamming
4 scheme. The system model is shown in Fig., where all nodes are equipped with a single antenna, and the eavesdropper can intercept the data from both the source S and relay R, and the relay applies the decode-and-forward DF) protocol. The channel coefficients for S R, R D, S E and R E are denoted as h sr, h rd, h se and h re, respectively. We assume that all channels experience block Rayleigh fading and that the channels remain constant over one block but vary independently from one block to another. The corresponding channel gains, obtained as γ j = h j 2 j {sr, rd, se, re}), are independently exponentially distributed with mean of λ j j {sr, rd, se, re}) respectively. The noise at nodes R, D and E are denoted as n r t), n d t) and n e t) with variances of σj 2 j {r, d, e}) respectively. The transmission powers at S and R are E s and E r respectively. We particularly note that, in this paper, we assume S and D are well separated so that there is no effective direct S D transmission link [?], [?]). On the other hand, if the direct S D link exist, the destination D receives signals from both the source S and relay R which need to be separated. In the half-duplex scheme, this can be easily achieved by letting S and R transmit at odd and even time slots respectively. In the full duplex scheme, other approaches are necessary for the signal separation. For example, multiple antennas can be used to separate signals in the spatial domain and the CDMA can be used to separate signals with different spreading codes for S and D respectively. Alternatively, the network-coding based approaches may be applied. To be specific, we assume initially at time slot t =, S transmits data s) to both R and D, and R has no data to transmit yet. At time t = 2, S and R transmit data s2) and s) to D respectively. Then at the destination D, s) and s2) can be separated by subtracting the previously received s) at time t = ) from the current received signal at time t = 2). Continue this process until all data are transmitted. This is similar to the two-path transmission in [?,?]. The detail of this issue is beyond the scope of this paper and will be left as an interesting topic for future study. A. Secrecy capacity by We assume at time t, the source transmits x s t) to the relay R, and the received signal at R is given y r t) = E s h sr t)x s t) + n r t), )
5 and the eavesdropper E intercepts the signal from S as y e t) = E s h se t)x s t) + n e t). 2) At time t + ), if the relay R successfully decodes x s t), it forwards x s t) to D. The received signals at D and E are given by y d t + ) = E r h rd t + )x s t) + n d t + ), y e t + ) = E r h re t + )x s t) + n e t + ), 3) respectively. For notational convenience, the time index t is ignored below unless necessary. The secrecy capacity is defined as see [4]), C s = [C t C e ] +, 4) where [x] + = maxx, 0), C t and C e are the capacities for data transmission and eavesdropping respectively. Because the relay applies DF, we have C t = minc sr, C rd ), 5) where C sr and C rd are the channel capacities for S R and R D respectively. In order to concentrate on the secrecy performance of the network, we assume the channel SNR is high enough so that the relay and destination nodes can always decode the data. Then we have C sr = 2 log 2 + E s h sr 2 ) 2 log 2γ sr ), σ 2 r C rd = 2 log 2 + E r h rd 2 ) 2 log 2γ rd ), where we assume without losing generality that E r = E s = and σ 2 r = σ 2 d σ 2 d 6) =, so that the channel gains γ sr and γ rd become the channel SNRs for S R and R D respectively. Similar assumption is used in the rest of the paper. Substituting 6) into 5) gives { C t = min 2 log 2γ sr ), } 2 log 2γ rd ). 7) On the other hand, because the eavesdropper receives the data x s t) twice, from S and R at time t and The transmission and noise powers can always be normalized to unity by absorbing into the corresponding channel SNR.
6 t + ) respectively, the eavesdropping capacity is obtained as C e = 2 log 2 + E ) s h se 2 + E r h re 2 2 log 2γ se + γ re ), 8) σ 2 r where γ se and γ re are the channel SNRs for S E and R E respectively. Note that the /2 factor in 7) and 8) are due to the half duplex transmission at the relay node. Substituting 7) and 8) into 4) gives the secrecy capacity of the half duplex scheme as C HDR = B. Secrecy outage probability [ 2 log 2minγ sr, γ rd )) ] + [ 2 log 2γ se + γ re ) = 2 log 2 )] + minγsr, γ rd ). 9) γ se + γ re From 9), the secrecy outage probability for the half duplex relay scheme is given by ) minγsr, γ rd ) P HDR = P C HDR < R s ) = P < 2 2Rs, 0) γ se + γ re where R s is the target secrecy rate. Note that, because R s 0, we have P [x] + < R s ) = P x < R s ) so that the operator [.] + can be removed in 0). Letting X = min γ sr, γ rd ), Y = λ se + λ re and Z = X/Y, 0) becomes P HDR = F Z 2 2Rs ) = 0 F X 2 2Rs y)f Y y)dy, ) where F.) and f.) are the cumulative density function CDF) and probability-density-function PDF) respectively. The CDF of X can be obtained as F X x) = e xλsr+λ rd ) λsrλ rd, 2) and the PDF of Y is given by f Y y) = ye y/λ se, λ λ 2 se = λ re se e y/λ re e y/λ se λ se λ re e yλse+λre) λseλre, λ se λ re 3) Substituting 2) and 3) into ) gives the secrecy outage probability of the half duplex secrecy network as P HDR = 2 2Rs λ se λ re λ sr + λ rd ) 2 + λ 2 rd λ sr + λ rd λ 2 sr)λ re + λ se ). 4) 2 4R s λse λ re λ sr + λ rd ) 2 + 2 2R s λ 2 rd λ sr + λ rd λ 2 sr)λ re + λ se ) + λ 2 srλ 2 rd
7 Before we leave this section, it is interesting to point out that, while the eavesdropper listens to S and R at time t and t + ) for the same data x s t) respectively, it can be easily assumed that the secrecy outage probability is the probability that eavesdropper can decode x s t) from either S or D. This is however not correct as the eavesdropper will combine the data from S and D together before it decodes the data. Similar mistake unfortunately still appears in some recent publications e.g. in [2] though it is for the secrecy outage in a relay selection cognitive radio network). Alternatively in [9], the eavesdropping capacity of a relay selection secrecy system is obtained by taking the maximum gain of the S E and R E channels, which is smaller than the true eavesdropping capacity. And thus the resulting secrecy outage probability is in fact a lower bound. III. FULL DUPLEX SECRECY RELAY NETWORK A. System model The system model of a full duplex secrecy relay network can also be shown in Fig., except that the relay is now equipped with two antennas for receiving and transmission respectively. We assume that, at time slot t, the source S transmits x s t) to the relay R. The relay R receives data from S with its receiving antenna, and at the same time uses its transmission antenna to transmit the previously decoded signal x s t ) to the destination. Because R receives and transmits simultaneously, when R is receiving, it is interfered by its own transmission which is called self-interference. Then the received signal at R is given by y r t) = E s h sr t)x s t) + E r h rr t)x s t ) + n r t), 5) where h rr t) is the residual self-interference after the self-interference cancellation. It is often assumed that the self-interference can be significantly suppressed 2 e.g. [2], [22]) so that h rr t) can be regarded as an independent Rayleigh distributed variable e.g. [23], [24]). The received signal at the destination D is similar to that in the half duplex scheme which is given by y d t) = E r h rd t)x s t ) + n d t). 6) Because now the source and relay transmit simultaneously, at time t, the received signal at the 2 Self-interference cancellation algorithms are beyond the scope of this paper.
8 eavesdropper is given by y e t) = E s h se t)x s t) + E r h re t)x s t ) + n e t). 7) It is interesting to observe that 7) is similar to the intersymbol interference ISI) channel, and thus the eavesdropping capacity is expected to be lower than that in the half duplex scheme. Assuming there are B data packets per block, and stacking the received signals at the eavesdropper for all B data in one block, 7) can be expressed in a matrix/vector form as y e = Hx s + n e, 8) where y e = y e [B + ],, y e []) T, x s = x s [B],, x s []) T and n e = n e [B + ],, n e []) T, and H is the eavesdropping channel matrix which is given by H = Er h re Es h se Er h re Es h se Er h re... E s h se Er h re Es h se 9) B+) B, and T denotes the transpose operator. B. Secrecy capacity From 5), the channel capacity for S R is given by C sr = log 2 + E ) s h sr 2 E r h rr 2 + σr 2 log 2 γsr γ rr + ), 20) where the approximation holds over the high SNR range, and similar to 6) the transmission and noise powers are normalized to unity, so that γ rr and γ rr are the channel gains for the S R and selfinterference channels, respectively. Because we assume self-interference can be significantly suppressed, when the SNR is sufficiently high, we have γ sr γ rr + ) so that the approximation in 20) holds. The channel capacity for R D is similar to that in the half duplex scheme as is shown in 6)) but without the /2 factor due to the full duplex transmission. Then from 5), the transmission capacity of
9 the full duplex scheme is given by { }) γsr C t = log 2 min γ rr +, γ rd. 2) On the other hand, from 8), the eavesdropping capacity can be obtained as C e = B log 2 det{i + H H H}, 22) where det.) and.) H denote the matrix determinant and Hermitian transpose respectively. Substituting 2) and 22) into 4) gives the secrecy capacity for the full duplex network C F DR = C. Eavesdropping capacity )) γsr ) [log ] + 2 min γ rr +, γ rd log 2 det{i + H H H}) B. 23) Below we further investigate the eavesdropping capacity C e. From the eigen-decomposition of H H H, 22) can be reformed as C e = B B log 2 + θ b ), 24) where θ b is the bth eigenvalue of H H H. Because H is a Toeplitz matrix, θ b is given by see [25]) θ b = h se 2 + h re 2 ) + 2 h bπ seh re cos, b {, 2,..., B}. 25) B + Substituting 25) into 24) gives C e = log 2 + hse 2 + h re 2) + B ) B log 2 + 2 h seh re cos bπ B+. 26) + h se 2 + h re 2 Because 2 h seh re cos bπ B+ 2 h seh re h se 2 + h re 2 < h se 2 + h re 2 +, we have 2 h seh re cos bπ B+. 27) h se 2 + h re 2 + For simplicity, we let u = 2 h seh re cos bπ B+ )/ h se 2 + h re 2 + ). Then using a Taylor expansion, we have B B log 2 + u) = B B ln 2 B u = ln 2 B u 2 u2 + 3 u3 ) 4 u4 + B 2 u2 + B 3 u3 B ) 4 u4 +. 28)
0 It is interesting to note that B uk = 0 if k is odd. Thus the odd exponents in 28) are all zeros, so that we have B B log 2 + u) = ln 2 B B 2 u2 + B ) 4 u4 + 0, 29) where the equality holds for h se = 0 or h re = 0. Letting Ce 26) and 29), we have = /B B log 2 + u), and from C e = log 2 + hse 2 + h re 2) Ce log 2 + hse 2 + h re 2). 30) This implies that, except for the /2 factor, the eavesdropping capacity of the full duplex scheme is smaller than that of the half duplex scheme, unless either the S E or R E eavesdropping channel gain is zero. This is not surprising because in the full duplex scheme, the simultaneous transmission from S and R interfere with each at the eavesdropper. Below we further show how much such interference or Ce ) affects the eavesdropping capacity. Ignoring the high order terms in 29), we have Ce = B log B 2 + u) 2 ln 2 B = 2 ln 2 B 2 h seh re h se 2 + h re 2 + = 2 ln 2 2 + 2B ) B 2 u2 ) 2 B cos 2 2 h seh re h se 2 + h re 2 + ) 2. bπ B + 3) Further noting that 2 h seh re h se 2 + h re 2 + < 2 h seh re, 32) h se 2 + h re 2 where equality holds h se = h re, then the maximum Ce where the approximation holds for large block size B. is approximately given by Ce,max = 2 ln 2 2 + ) 2B 4 ln 2, 33) Substituting 33) into 30), we have the minimum eavesdropping capacity which is approximately given by C e,min log 2 + hse 2 + h re 2) 4 ln 2. 34)
Recalling that Ce 0, it is clear from 30) that the maximum eavesdropping capacity is given by C e,max = log 2 + hse 2 + h re 2), 35) which is achieved when Ce = 0, or h se = 0 or h re = 0. From the above analysis we conclude that, when either the S E or R E eavesdropping channels is weak either h se or h re is close to zero), the eavesdropping capacity is close to its maximum value which is given by 35). When the S E and R E channels have similar gains h se h re ), the receiving eavesdropper is most severely interfered with and the eavesdropping capacity is close to its minimum given by 34). On the other hand, C e,max and C e,min only differ by approximately /4 ln 2), which is a constant. When either of the eavesdropping channels is strong enough, i.e. either h se 2 or h re 2 is large such that log 2 + h se 2 + h re 2 ) /4 ln 2), we have C e log 2 + h se 2 + h re 2 ). This leads to an interesting result: the interference at the eavesdropper from the simultaneous transmission at S and R has limited effect on the eavesdropping capacity especially for strong eavesdropping channels. D. Secrecy outage probability From 23) and 30), the secrecy outage probability of the full duplex scheme can be obtained as P F DR = P C F DR < R s ) = P [log 2 min P [log 2 min γsr γ rr +, γ rd γsr γ rr +, γ rd )) log 2 + hse 2 + h re 2) Ce ) ] < R s ) )) log 2 hse 2 + h re 2) Ce ) ] < R s ), 36) where the approximation holds at high SNR. While it is hard to obtain a closed form for 36) due to the presence of Ce, we can obtain the minimum and maximum of the secrecy outage probability which gives very good approximation to the true value. When Ce = 0, we have the maximum secrecy outage probability, or the upper bound of P F DR, as ) XF P F DR,max = P Y < 2Rs 37) = F Z 2 R s ) = F XF yγ f )f Y y)dy, where X F = min γ sr γ rr +, γ rd ), Y = h se 2 + h re 2 and Z = X/Y. 0
2 The PDF of Y, f Y y), is the same as that in the half duplex scheme which is given by 3). The CDF of X F can be obtained as F XF x) = λ sre xλsr+λ rd ) λsrλ rd λ sr + λ rr x. 38) Substituting 3) and 38) into 37) gives the upper bound of the secrecy outage probability as P F DR,max = F Z 2 R s ) = [2 3Rs λ rd λ 3 se λ2 rr +22Rs λ rd λ 2 se λ srλ 2 rr +23Rs λ sr λ 3 se λ2 rr λ rdλ se λ 2 sr λ rr2 Rs +e n Ei,n)λ rd λ se λ 2 sr 2Rs +λ se λ 3 sr 2Rs +λ rd λ 3 sr )] λ 2 se λ2 rr 22R s 2 R s λ rd λ se +2 R s λ se λ sr +λ rd λ sr ), λ se = λ re λ se λ re )2 Rs λ rr [ 2 R s λ rr λ se λ re ) + λ sr e m Ei, m) e n Ei, n)) ], λ se λ re 39) where m = 2R s λ rd λ re+2 R s λ reλ sr+λ rd λ sr 2 R s λ rd λ re λ rr, n = 2R s λ rd λ se+2 R s λ seλ sr+λ rd λ sr 2 R s λ rd λ se λ rr, and Ei ) is the exponential integral function, that is, Eia, b) = e xb x a dx. On the other hand, when Ce = Ce,max /4 ln 2) as is shown in 33), we obtain the approximate minimum secrecy outage probability as P F DR,min = F Z 2 Rs Ce,max ) F Z 2 Rs 4 ln 2 ). 40) We note that 40) is not a strict lower bound of P F DR, but it gives accurate approximation of the best secrecy performance of the full duplex scheme. This is because of the Tayler series approximation used in 3). E. Discussion Compared with the half duplex scheme, there are several factors that affect the secrecy capacity of the full duplex relay. The first is that the full duplex scheme has no /2 factor in both the transmission and eavesdropping capacities. This is equivalent to halving the target secrecy rate, which leads to higher secrecy capacity according to the definition of the secrecy capacity. The second factor is the simultaneous transmission of the source and relay nodes in the full duplex transmission. The influence of the simultaneous transmission on the eavesdropping capacity has been analyzed in Section III-C. From the analysis, we know that the simultaneous transmission in the full duplex scheme does help to improve the secrecy capacity, but the influence is limited. The most influence occurs when the S E and R E eavesdropping channels have the same gains, which leads to decreasing the target rate by /4 ln 2) as is shown in 40). The least influence applies when either of the
3 eavesdropping channels is zero. The third factor that influences the secrecy performance is the self-interference at the relay due to the full duplex transmission. It is clearly shown in 20) that the self-interference channel γ rr decreases the channel capacities for S R, which deteriorates the secrecy capacity of the full duplex scheme. The impact of the self-interference on the secrecy capacity will be investigated in the simulation section. In summary, for the full duplex network, the first and second factors improve the secrecy performance, and the third factor deteriorates the secrecy performance. Because the second factor the simultaneous transmission) has no significant effect on the secrecy performance, the secrecy performance advantage of the full duplex over the half duplex scheme mainly comes from the /2 factor in the capacities, if the self-interference can be sufficiently suppressed as it can in many systems. IV. FULL DUPLEX JAMMING RELAY NETWORK A. Secrecy capacity This section proposes a full duplex jamming relay network. The system model is the similar to that of the full duplex scheme, but the relay R now switches between full and half duplex operation. At time slot t, the relay works in full duplex mode: the source S transmits data x s t) to R, R receives and decodes x s t) from S. At the same time, R transmits the jamming signal j r t) to the eavesdropper E. Then the received signals at R and E at time t are given by y r t) = E s h sr t)x s t) + E r h rr t)j r t) + n r t), y e t) = E s h se t)x s t) + E r h re t)j r t) + n e t), 4) respectively. At time t+), the relay R works in the half duplex mode that it only transmits the previously decoded x s t) to the destination, and switches off its receiving antenna. At the same time, the source S transmits the jamming signal j s t + ) to the eavesdropper. Then at time t + ), the eavesdropper receives the following signal y e t + ) = E r h re t + )x s t) + E s h se t + )j s t + ) + n e t + ). 42) Because we assume no direct link between S and D, the jamming signal j s t + ) has no effect on D so that the received signal at D is the same as that for the half duplex scheme which is shown in 3). Then
4 the transmission capacity can be obtained as C t = 2 log 2 { }) γsr min γ rr +, γ rd. 43) Comparing 2) and 43) shows that the full duplex and full duplex jamming schemes have similar data transmission capacity, except there is a /2 factor in the capacity of the latter. This is because the data rate of the full duplex jamming scheme is the same as that of the half duplex scheme. On the other hand, from 4) and 42), the eavesdropping capacity C s is given by C e = 2 log 2 + γ se + γ ) re. 44) γ re γ se Substituting 43) and 44) into 4) gives the secrecy capacity for the full duplex jamming scheme at the high SNR region as C F DJ = [ )) 2 log γsr 2 min γ rr +, γ rd 2 log 2 + γ se + γ )] + re. 45) γ re γ se B. Secrecy outage probability Letting X = min is obtained as γ sr γ rr +, γ rd ), Y = γ se γ re + γ re γ se and Z = X/ + Y ), the the secrecy outage probability ) X P F DJ = P C F DJ < R s ) = P + Y < 22Rs = F Z 2 2Rs ) = 2 2Rs +y) 0 0 f X x)f Y y)dxdy. Next we calculate the PDF of X and Y to derive 46). First, taking the derivative of the CDF of X which is shown in 38)) gives the PDF of X as Then the PDF of Y, f Y y), can be obtained as 46) λsr+λ rd )x f X x) = e λsrλ rd [λ rd + λ sr )λ rr x + λ sr ) + λ sr λ rr ]. 47) λ rr x + λ sr ) 2 λ rd ) 2M 3 ln [M+y][My+] M M 2 + My 2 + M + ) + MyM 6 + 2M 5 y + M 4 y 2 + M 4 + 2M 3 y + M 2 y 2 + M 2 + 2My + ) M 7 + 4M 6 y + 6M 5 y 2 + 4M 4 y 3 + M 3 y 4 + 3M 5 + 9M 4 y + 9M 3 y 2 + 3M 2 y 3 + 3M 3 + 6M 2 y + 3My 2 + M + y)my + ), 48)
5 where M = λ se /λ re. Substituting 47) and 48) into 46) gives P F DJ = 0 λ sre 2 Rs λsr+λ rd )y+) λsrλ rd f Y y) dy. 49) 2 Rs λ rr y + 2 Rs λ rr + λ sr While 49) is in an integral close form, it can be easily obtained numerically with, for example Matlab or Maple [26]. C. Discussion In either the full duplex or full duplex jamming scheme, the eavesdropper receives signals from both source and relay simultaneously. In the full duplex scheme, both received signals at the eavesdropper are the data so that they can be jointly decoded, leading to the similar eavesdropping capacity to that for the half duplex scheme except the /2 factor). This has been clearly shown in Section III. While in the jamming scheme, the eavesdropper always receives data from one node and jamming signal from another node. The jamming signals impose serious interference to the data decoding at the eavesdropper, resulting in significant decrease in the eavesdropping capacity. On the other hand, for the data transmission, the jamming scheme is still half duplex so that there is a /2 factor in its data and eavesdropping capacities. The /2 factor, which is equivalent to doubling the secrecy rate compared with the full duplex scheme, deteriorates the secrecy performance in the jamming scheme. It is clear from the definition of the secrecy capacity that such deterioration is more serious for higher target secrecy rate. This leads to an interesting observation: when the target secrecy rate is small, the influence from the /2 factor is also small, so that the jamming scheme has significant better secrecy performance than the full duplex scheme. But when the target secrecy rate becomes higher, the secrecy difference between the jamming and full duplex scheme becomes smaller. In fact, when the target secrecy rate is high enough, the full duplex scheme may have better secrecy performance than the jamming scheme. These will be very well verified by the simulation in the next section. We also note that, while the secrecy outage analysis in this paper is for the relay network without a S D direct link, the described half duplex, full duplex and full duplex jamming schemes can be readily applied in the network with a S D direct link. On the other hand, including the S D direct link complicates the performance analysis without gaining more insight into the half-/full- duplex relay which is the main focus of this paper. Finally we would like to point out that, while the secrecy performance analysis in this paper is based on the knowledge of the channel-state-information CSI) for all channels
6 including the eavesdropping channels), the implementation of the half duplex, full duplex and full duplex jamming schemes do not rely upon the CSI knowledge. V. SIMULATIONS In this section, simulation results are given to verify the above analysis, where HDR, FDR and FDJ represent the half duplex, full duplex and full duplex jamming schemes in following figures. In the simulations, the noise variances σr, 2 σd 2 and σ2 e and the source and relay transmission powers E s and E r are all normalized to unity, and the block size B = 000. The simulation results are obtained by averaging over 00, 000 independent runs. Fig. 2 verifies the secrecy outage analysis of the full duplex scheme in Section III-D, where we let γ rr = 0 db and γ sr = γ rd = 40 db; the theoretical maximum and minimum of the secrecy outage probability are obtained by 39) and 40) respectively. In is clearly shown that, when the S E and R E eavesdropping channels have similar gains γ se = γ re = 5 db), the secrecy outage probability is close to the minimum value. While when one of the eavesdropping channels is weak γ se = 25 db and γ re = 0 db), the secrecy outage probability is close to the upper bound. In any case, the difference between the maximum and minimum secrecy outage probabilities are not significant. This verifies the analysis in Section III-D. In following simulations, only the simulation results for the full duplex scheme are shown for better exposition. 0 0 Secrecy outage probability 0 Simulation FDR γ se = 25 db and γ re = 0 db) Upper bound FDR γ se = 25 db and γ re = 0 db) Approximate minimum FDR γ se = 25 db and γ re = 0 db) Simulation FDR γ se = γ re = 5 db) Upper bound FDR γ se = γ re = 5 db) Approximate minimum FDR γ = γ = 5 db) se re 0 2 2 3 4 5 6 7 8 Target secrecy rate Fig. 2. Theoretical vs numerical secrecy outage probabilities for full duplex relay scenario for γ sr = γ rd = 40 db, γ rr = 0 db. Fig. 3 shows the secrecy outage probability vs data transmission SNR for HDR, FDR and FDJ, where we let γ sr = γ rd, γ rr = 0 db and γ se = γ re = 0 db. Both the simulation and theoretical results for the half duplex and full duplex jamming schemes are presented, which are shown to be well matched. This verifies
7 0 0 0 Secrecy outage probability 0 2 0 3 SImulation HDR Theoretical HDR R s = 2) Theoretical HDR R s = ) SImulation FDJ Theoretical FDJ R s = 2) Theoretical FDJ R s = ) SImulation FDR R s = 2) SImulation FDR R s = ) 0 4 0 5 20 25 30 35 40 45 50 SNR γ sr = γ rd ) db Fig. 3. Secrecy outage probabilities vs channel SNR for HDR, FDR and FDJ schemes, where γ sr = γ rd, γ se = γ re = 0 db and γ rr = 0 db. the closed-form secrecy outage probabilities for the half duplex and jamming schemes which are given by 4) and 49) respectively. It is shown in Fig. 3 that, when the target secrecy rate is small R s = ), the jamming scheme has better secrecy performance than the full duplex scheme. But when the target secrecy rate is large R s = 2), the jamming scheme has slightly worse secrecy outage performance than the full duplex scheme. In all cases, the half duplex has the worst secrecy performance. These observations are exactly what we expected in Section IV-C. 0 0 Secrecy outage probability 0 HDR γ se = γ re = 20 db) 0 2 FDR γ se = γ re = 20 db) FDJ γ se = γ re = 20 db) HDR γ = γ = 0 db) se re FDR γ se = γ re = 0 db) FDJ γ = γ = 0 db) se re 0 3 2 3 4 5 6 7 8 Target secrecy rate Fig. 4. Secrecy outage probabilities vs target secrecy rate for FDR, FDJ and HDR schemes, where γ sr = γ rd = 40 db and γ rr = 0 db. Fig. 4 shows the secrecy outage probability vs target secrecy rate for half duplex, full duplex and jamming schemes, where we let γ sr = γ rd = 40 db and γ rr = 0 db. It is shown that, for γ se = γ re = 20 db, when the target secrecy rate is small enough R S < 4.7), the jamming scheme has better secrecy
8 outage performance than the full duplex scheme. This is because the interference from jamming has more influence on the secrecy performance than the /2 factor. When the target rate becomes higher, the /2 factor in the capacities of the jamming scheme starts to have more influence on the secrecy performance. Until the target rate R S > 4.7, the jamming scheme has higher secrecy outage probability than the full duplex scheme. On the other hand, when γ se = γ re = 0 db, the jamming has less influence on the secrecy performance than that for γ se = γ re = 20 db. As a result, only when R S <.7, the jamming scheme has better secrecy outage than the full duplex scheme. Otherwise, it is the full duplex scheme that has lower secrecy outage probability. This simulation further verifies the analysis in Section IV-C Fig. 5 shows the secrecy performance vs residual self-interference γ rr for different approaches, where we let γ sr = γ rd = 40 db and γ se = γ re = 0 db. It is clearly shown that, when the secrecy target R s = 2, the full duplex has better performance than the half duplex scheme when γ rr < 9 db. But when R s =, the full duplex has better performance than the half duplex scheme only when γ rr < 5 db. This is what we expected, because the main reason for the full duplex scheme to have better secrecy performance than the half duplex scheme is the associated /2 factor in the capacities, whose impact on the secrecy performance goes up with higher data rate. It is also shown in Fig. 5 that, when R s =, the jamming scheme has better performance than the full duplex scheme. And when R s = 2, the jamming scheme has slightly worse performance than the full duplex scheme. The reason is the same as that in Fig. 4. 0 0 Secrecy outage probability 0 0 2 HDR R s = 2) FDR R s = 2) FDJ R s = 2) HDR R s = ) FDR R s = ) FDJ R = ) s 0 3 0 5 0 5 20 25 30 35 40 SNR λ rr ) db Fig. 5. Secrecy outage probabilities vs residual self-interference γ rr for FDR, FDJ and HDR schemes, where γ sr = γ rd = 40 db and γ se = γ re = 0 db.
9 VI. CONCLUSION In this paper, we investigated the secrecy performance of a full duplex relay network and proposed the full duplex jamming scheme to further improve the secrecy performance. The secrecy outage probability of the half duplex, full duplex and full duplex jamming schemes have been analyzed. The analysis shows that, the full duplex scheme has better secrecy performance than the half duplex scheme. On the other hand, the proposed full duplex jamming scheme has better secrecy performance than the full duplex scheme for small target secrecy rate, and the improvement may disappear when the target rate becomes large. The secrecy improvement of the full duplex jamming scheme is at the price of data rate lose. Numerical examples have been given to verify the analysis. ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers and the editor for their constructive comments. REFERENCES [] E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, Identity based key management in mobile ad hoc networks: Techniques and applications, IEEE Trans. Wireless Commun., vol. 5, no. 5, pp. 46 52, Oct. 2008. [2] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, Wireless information-theoretic security, IEEE Trans. Inform. Theory, vol. 54, pp. 255 2534, June 2008. [3] Y. Liang, H. V. Poor, and S. Shamai, Secure communication over fading channels, IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2470 2492, June 2008. [4] P. K. Gopala, L. Lai, and H. E. Gamal, On the secrecy capacity of fading channels, IEEE Trans. Inform. Theory, vol. 54, no. 0, pp. 4687 4698, Oct. 2008. [5] Y. Liang and H. V. Poor, Multiple-access channels with confidential messages, IEEE Trans. Inform. Theory, vol. 54, no. 3, pp. 976 002, Mar. 2008. [6] I. Csiszr and P. Narayan, Secrecy capacities for multiterminal channel models, IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2437 2452, June 2008. [7] A. Khisti, A. Tchamkerten, and G. W. Wornell, Secure broadcasting over fading channels, IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2453 2469, June 2008. [8] P. Popovski and O. Simeone, Wireless secrecy in cellular systems with infrastructure-aided cooperation, IEEE Trans. Inform. Forensics and Security, vol. 4, no. 2, pp. 242 256, June. 2009. [9] Y. Zou, X. Wang, W. Shen, and L. Hanzo, Security versus reliablity analysis of opportunistic relaying, To appear IEEE Trans. Veh. Technol., 203. [0] E. Tekin and A. Yener, The general gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming, IEEE Trans. Inform. Theory, vol. 54, pp. 2735 275, June 2008. [] Y. Liu, J. Li, and A. P. Petropulu, Destination assisted cooperative jamming for wireless physical-lay security, IEEE Trans. Inf. Froensics and Security, vol. 8, no. 4, pp. 682 694, April 203.
20 [2] H. Ju, E. Oh, and D. Hong, Improving efficiency of resource usage in two-hop full duplex relay systems based on resource sharing and interference cancellation, IEEE Trans. Wireless Commun., vol. 8, no. 8, pp. 3933 3938, Aug. 2009. [3] T. Riihonen, S. Werner, and R. Wichman, Optimized gain control for single-frequency relaying with loop interference, IEEE Trans. Wireless Commun., vol. 8, pp. 280 2806, June 2009. [4] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, Achieving single channel, full duplex wireless communication, MobiCom, Chicago, USA, Sep. 200. [5] S. Hong, J. Brand, J. Choi, M. Jain, J. Mehlman, S. Katti, and P. Levis, Aplications of self-interference cancellation in 5G and beyond, IEEE Commun. Magazine, vol. 52, no. 2, pp. 4 2, Feb. 204. [6] D. Bharadia, E. McMilin, and S. Katti, Full duplex radios, ACM SIGCOMM, Hong Kong, China, Aug. 203. [7] B. Debaillie, D. J. Broek, C. Lavin, B. Liempd, E. A. M. Klumperink, C. Palacios, J. Craninckx, B. Nauta, and A. Parssinen, Analog/RF solutions enabling compact full-duplex radios, to appear IEEE J. Sel. Areas Commun. [8] W. Li, M. Ghogho, B. Chen, and C. Xiong, Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis, IEEE Commun. Lett., vol. 6, no. 0, pp. 628 63, Oct. 202. [9] G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B.Ottersten, Improving physical layer secrecy using full-duplex jamming receivers, IEEE Trans. Signal Process., vol. 6, no. 20, pp. 4962 4974, Oct. 203. [20] A. Mukherjee and A. L. Swindlehurst, A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures, in Proc. Asilomar Conf. Sign. Systems Comp., Pacific Grove, CA, pp. 265 269, Nov. 20. [2] N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users, IEEE Trans. Wireless Commun., vol. 3, no. 2, pp. 058 073, Feb. 204. [22] C. R. Anderson, S. Krishnamoorthy, C. G. Ranson, T. J. Lemon, W. G. Newhall, T. Kummetz, and J. H. Reed, Antenna isolation, wideband multipath propagation measurements and interference mitigation for on-frequency repeaters, in Proc. IEEE SoutheastCon, Mar. 2004. [23] T. Kwon, S. Lim, S. Choi, and D. Hong, Optimal duplex mode for DF relay in terms of the outage probability, IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3628 3634, Sep. 200. [24] I. Krikidis, H. A. Suraweera, P. J. Smith, and C. Yuen, Full-duplex relay selection for amplify-and-forward cooperative networks, IEEE Trans. Wireless Commun., vol., no. 2, pp. 438 4393, Dec. 202. [25] S. Noschese, L. Pasquini, and L. Reichel, Tridiagonal toeplitz matrices: Properties and novel applications, Numerical Linear Algebra with Applications, vol. 20, pp. 302 326, April 202. [26] A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, Breaking spectrum gridlock with cognative radios: an information theoretic perspective, Proceedings of the IEEE, vol. 97, no. 5, pp. 894 94, May. 2009.